Re: CVE-2013-6450 and 0.9.8-line

2014-01-20 Thread Dr. Stephen Henson
On Mon, Jan 20, 2014, no_spam...@yahoo.com wrote: > > Can you give me any information with regards to how the exploitation of > CVE-2013-6450 against 0.9.8y may manifest itself?  If not a DoS, could it > cause a process using libssl to core, cause libssl to return an "okay" when > it should retur

Re: CVE-2013-6450 and 0.9.8-line

2014-01-20 Thread no_spam_98
sensitive information, etc.? Thanks. - Original Message - > Sent: Thursday, January 16, 2014 1:51 PM > Subject: Re: CVE-2013-6450 and 0.9.8-line > > Oh, okay.  Thank you for that tidbit. > > If not a DoS, how does the issue manifest itself in 0.9.8 if an adversary >

Re: CVE-2013-6450 and 0.9.8-line

2014-01-16 Thread no_spam_98
014 12:22 PM > Subject: Re: CVE-2013-6450 and 0.9.8-line > > On Thu, Jan 16, 2014, no_spam...@yahoo.com wrote: > > >> It is my understanding that 0.9.8y contains the DTLS retransmission flaw >> described in CVE-2013-6450. >> > > It contains the flaw

Re: CVE-2013-6450 and 0.9.8-line

2014-01-16 Thread Dr. Stephen Henson
On Thu, Jan 16, 2014, no_spam...@yahoo.com wrote: > It is my understanding that 0.9.8y contains the DTLS retransmission flaw > described in CVE-2013-6450. > It contains the flaw but it is not a DoS issue in 0.9.8. It's not a trivial fix for 0.9.8 because the DTLS record handling changed in 1.0.

CVE-2013-6450 and 0.9.8-line

2014-01-16 Thread no_spam_98
It is my understanding that 0.9.8y contains the DTLS retransmission flaw described in CVE-2013-6450. I thought I read somewhere that OpenSSL.org is working on a 0.9.8za release to address this issue (and other bug fixes). Is that correct?  If so, what is the release schedule? Thanks.